Loading

Quickstart: Protect your hosts with endpoint security

Serverless

In this guide, you’ll learn how to use Elastic Security to protect your hosts from malware, ransomware, and other threats.

  • Access to an Elastic Security Serverless project. If you don't have one yet, refer to Create a Security project to learn how to create one.
  • Ensure you have the appropriate Elastic Defend feature privileges.
  • Ensure you have the appropriate user role to configure an integration policy and access the Endpoints page.
  1. Install the Elastic Defend integration

    Elastic Defend detects and protects endpoints from malicious activity and provides automated response options before damage and loss occur.

    Note

    If you're installing Elastic Defend on macOS, the following instructions apply to hosts without a Mobile Device Management (MDM) profile. If your host has an MDM profile, refer to Deploy Elastic Defend on macOS with mobile device management.

  2. Add the Elastic Agent

    Elastic Agent is a single, unified way to add monitoring for logs, metrics, and other types of data to a host.

  3. Modify policy configuration settings

    After you install the Elastic Agent with Elastic Defend, several endpoint protections—such as preventions against malware, ransomware, memory threats, and other malicious behavior—are automatically enabled on protected hosts. If any of these behaviors are detected, Elastic Defend generates an alert, and by default, prevents the malicious activity from completing. However, you can tailor the policy configuration to meet your organization’s security needs.

    Tip

    You may want to consider analyzing which and how many alerts are generated over a specific time period to identify common patterns or anomalies before you make any policy changes. Check out the SIEM quick start guide to learn more about how to monitor alerts.

Now that you've got endpoint protection enabled, it's important not only to monitor your environment for alerts, but to manage your hosts to ensure they're healthy and have all appropriate security settings.

Note

You must have admin privileges to manage endpoints.

To view all endpoints running Elastic Defend, go to AssetsEndpoints. From here, you can view details such as agent and policy status, associated policy and IP address, or perform specific actions on the endpoint. For more information, refer to our documentation on managing endpoints.

Endpoints page in Elastic Security

Here are some other features Elastic Security provides to help manage host configuration:

  • Endpoint response actions: Perform response actions on an endpoint using a terminal-like interface. For example, isolating or releasing a host, getting a list of processes, or suspending a running process.

    Tip

    You can also automate some responses when an event meets the rule's criteria. Refer to Automated response actions for more information.

  • Trusted applications: Add Windows, macOS, and Linux applications that should be trusted so that Elastic Defend doesn't monitor them.

  • Blocklist: Prevent specified applications from running on hosts to extend the list of processes that Elastic Defend considers malicious. This adds an extra layer of protection by ensuring that known malicious processes aren’t accidentally executed by end users.

  • Host isolation exceptions: Add specific IP addresses that isolated hosts are still allowed to communicate with, even when blocked from the rest of your network.

Tip

You can apply trusted applications, blocklist entries, and host isolation exceptions to a single policy, or to all policies.

After your hosts are secure and your environment has all the appropriate security configuration enabled, we recommend taking these next steps:

  • Check out the Hosts page for a comprehensive overview of all hosts and host-related security events. This page is also useful to identify uncommon processes and anomalies discovered by machine learning jobs.
  • Enable prebuilt detection rules. You're already set to receive endpoint threat alerts from Elastic Defend, but did you know Elastic Security ships with several out-of-the-box rules that you can enable? Check out our SIEM quick start guide or our documentation.
  • Discover all the other tools available to manage Elastic Defend.